NVD - CVE-2026-46333
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
Information Technology Laboratory
National Vulnerability Database
National Vulnerability Database
NVD
Vulnerabilities
CVE-2026-46333<br>Detail
Received
This CVE record has recently been published to the CVE List and has been included within the NVD dataset.
Description
In the Linux kernel, the following vulnerability has been resolved:
ptrace: slightly saner 'get_dumpable()' logic
The 'dumpability' of a task is fundamentally about the memory image of<br>the task - the concept comes from whether it can core dump or not - and<br>makes no sense when you don't have an associated mm.
And almost all users do in fact use it only for the case where the task<br>has a mm pointer.
But we have one odd special case: ptrace_may_access() uses 'dumpable' to<br>check various other things entirely independently of the MM (typically<br>explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for<br>threads that no longer have a VM (and maybe never did, like most kernel<br>threads).
It's not what this flag was designed for, but it is what it is.
The ptrace code does check that the uid/gid matches, so you do have to<br>be uid-0 to see kernel thread details, but this means that the<br>traditional "drop capabilities" model doesn't make any difference for<br>this all.
Make it all make a *bit* more sense by saying that if you don't have a<br>MM pointer, we'll use a cached "last dumpability" flag if the thread<br>ever had a MM (it will be zero for kernel threads since it is never<br>set), and require a proper CAP_SYS_PTRACE capability to override.
Metrics
 
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate<br>vector strings. CVSS information contributed by other sources is also<br>displayed.
CVSS 4.0 Severity and Vector Strings:
NIST: NVD
N/A
NVD assessment<br>not yet provided.
CVSS 3.x Severity and Vector Strings:
NIST: NVD
Base<br>Score: N/A
NVD assessment<br>not yet provided.
-->
-->
CVSS 2.0 Severity and Vector Strings:
NIST: NVD
Base<br>Score: N/A
NVD assessment<br>not yet provided.
-->
-->
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.<br>We have provided these links to other web sites because they<br>may have information that would be of interest to you. No<br>inferences should be drawn on account of other sites being<br>referenced, or not, from this page. There may be other web<br>sites that are more appropriate for your purpose. NIST does<br>not necessarily endorse the views expressed, or concur with<br>the facts presented on these sites. Further, NIST does not<br>endorse any commercial products that may be mentioned on<br>these sites. Please address comments about this page to [email protected].
URL<br>Source(s)<br>Tag(s)
http://www.openwall.com/lists/oss-security/2026/05/15/9
CVE
https://git.kernel.org/stable/c/01363cb3fbd0238ffdeb09f53e9039c9edf8a730
kernel.org
https://git.kernel.org/stable/c/15b828a46f305ae9f05a7c16914b3ce273474205
kernel.org
https://git.kernel.org/stable/c/2a93a4fac7b6051d3be7cd1b015fe7320cd0404d
kernel.org
https://git.kernel.org/stable/c/4709234fd1b95136ceb789f639b1e7ea5de1b181
kernel.org
https://git.kernel.org/stable/c/6e5b51e74a40d377bcd3081dd33fbaa0e1aa7e3d
kernel.org
https://git.kernel.org/stable/c/8f907d345bae8f4b3f004c5abc56bf2dfb851ea7
kernel.org
https://git.kernel.org/stable/c/93d4ba49d18e3d7fb41a9927c2d0cca5e9dfefd6
kernel.org
Weakness Enumeration
CWE-ID<br>CWE Name<br>Source
Change History
2 change records found show changes
CVE Modified by CVE 5/15/2026 4:16:49 PM
Action<br>Type<br>Old Value<br>New Value
Added<br>Reference
http://www.openwall.com/lists/oss-security/2026/05/15/9
New CVE Received from kernel.org 5/15/2026 10:16:35 AM
Action<br>Type<br>Old Value<br>New Value
Added<br>Description
In the Linux kernel, the following vulnerability has been resolved:
ptrace: slightly saner 'get_dumpable()' logic
The 'dumpability' of a task is fundamentally about the memory image of<br>the task - the concept comes from whether it can core dump or not - and<br>makes no sense when you don't have an associated mm.
And almost all users do in fact use it only for the case where the task<br>has a mm pointer.
But we have one odd special case: ptrace_may_access() uses 'dumpable' to<br>check various other things entirely independently of the MM (typically<br>explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for<br>threads that no longer have a VM (and maybe never did, like most kernel<br>threads).
It's not what this flag was designed for, but it is what it is.
The ptrace code does check that the uid/gid matches, so you do have to<br>be uid-0 to see kernel thread details, but this means that the<br>traditional "drop...